Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 2min
Is There a New Law Concerning Software Security?
02:25 • 2min
SQL Lite's a Classic Buffer Overrun?
04:40 • 5min
How Do You Know if Your Application Is Vulnerable?
09:12 • 2min
Application Monitoring - Is Your Application Vulnerable?
10:54 • 2min
Microsoft Defender for Cloud Is a Cloud Security Poster Management and Cloud Workload Protection Platform
12:41 • 3min
S-Bomb
15:46 • 2min
Is There a Zero Day Coming Along?
18:03 • 2min
The CBE's Are Not Just for Microsoft or Azure Things, Right?
20:17 • 4min
IDE Security Plugins and Threat Modeling
24:04 • 2min
Shift Happens - How to Deploy DevSecOps Principles in the Development Lifecycle
25:41 • 2min
The Maximum Threat Modeling Tool
27:41 • 2min
Denial of Service - I Love You on This Album
29:43 • 2min
Do You Need to Do a Pension Testing?
31:23 • 2min
Pen Testing
33:18 • 2min
Security First Mindset in Software Development Life Cycle
35:39 • 2min
How to Do Continuous Monitoring and Threat Intelligence to Be More Compliant?
37:17 • 2min
How to Secure Your Website Design
38:47 • 2min
Security Guidelines For.NET Developers
40:40 • 2min
DevOps Success Story - GNCA
42:45 • 2min
Azure DevOps - What's Next for You?
44:37 • 2min
Dotmnt Rocks - Donner Rocks
46:31 • 2min


